You're telling me that a connection-oriented system with a volume a billionth of the internet can't keep logs of who initiates a connection for 5 minutes? Oh, yeah.
It does keep a log… of caller IDs. The problem isn’t the volume of data, it is that the system isn’t setup to authenticate callers so you can’t tie a spam call to any persistent identity to block
>It does keep a log… of caller IDs. The problem isn’t the volume of data, it is that the system isn’t setup to authenticate callers so you can’t tie a spam call to any persistent identity to block
Except the system is set up to authenticate callers[0] and that's been in place (at least in the US) for almost a year.
That it hasn't been as effective as it should be is another issue, but the technology exists and is (or should be) in place as specified by the law.
SMTP isn't authenticated either, and is by many measures way looser than the telephone system (which was built around managing physical wires for almost a century), and yet spam filtering has gotten pretty good?
The CNAM field in phone systems is a lot like the “from” field in an SMTP message, and the “source ip” in a IP packet. The sender can just set it to whatever they want.